The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Hi-index | 0.00 |
Wireless local area networks(WLANs) work upon a shared medium and broadcast data frames via radio waves. These features let legitimate users connect to Internet conveniently at WLAN access points but also let a malicious attacker misuse network flexibly. Attackers can launch jamming attacks by exploiting vulnerabilities in 802.11, which is a dominant protocol used by WLAN. We discuss two jamming attacks, RTS and CTS jamming, and address their attacking conditions and threats. To defend against jamming attacks, a CUSUM based detection method is proposed, which can accurately detect jamming attacks with little computation and storage cost. When continuous attacking packets are sent out, a change-point will appear in a traffic sequence. Our detection method is capable to observe such change-points and then launch alarms. The efficiency of defense methods is verified by simulation results.